if (!using_ktls) {
/* Explicit IV length, block ciphers appropriate version flag */
- if (s->enc_write_ctx && SSL_USE_EXPLICIT_IV(s)
- && !SSL_CONNECTION_TREAT_AS_TLS13(s)) {
+ if (s->enc_write_ctx != NULL && RLAYER_USE_EXPLICIT_IV(rl)
+ && rl->version != TLS1_3_VERSION) {
int mode = EVP_CIPHER_CTX_get_mode(s->enc_write_ctx);
if (mode == EVP_CIPH_CBC_MODE) {
eivlen = EVP_CIPHER_CTX_get_iv_length(s->enc_write_ctx);
* In TLSv1.3, once encrypting, we always use application data for the
* record type
*/
- if (SSL_CONNECTION_TREAT_AS_TLS13(s)
+ if (rl->version == TLS1_3_VERSION
&& s->enc_write_ctx != NULL
&& (s->statem.enc_write_state != ENC_WRITE_STATE_WRITE_PLAIN_ALERTS
|| thistempl->type != SSL3_RT_ALERT))
}
}
- if (SSL_CONNECTION_TREAT_AS_TLS13(s)
+ if (rl->version == TLS1_3_VERSION
&& !using_ktls
&& s->enc_write_ctx != NULL
&& (s->statem.enc_write_state != ENC_WRITE_STATE_WRITE_PLAIN_ALERTS
rl->msg_callback(1, thiswr->rec_version, SSL3_RT_HEADER, recordstart,
SSL3_RT_HEADER_LENGTH, rl->cbarg);
- if (SSL_CONNECTION_TREAT_AS_TLS13(s) && s->enc_write_ctx != NULL) {
+ if (rl->version == TLS1_3_VERSION && s->enc_write_ctx != NULL) {
unsigned char ctype = thistempl->type;
rl->msg_callback(1, thiswr->rec_version, SSL3_RT_INNER_CONTENT_TYPE,